EP2556646B1 - Verfahren zum zugriff auf einem ausgestrahlten datenflusses - Google Patents
Verfahren zum zugriff auf einem ausgestrahlten datenflusses Download PDFInfo
- Publication number
- EP2556646B1 EP2556646B1 EP11719332.6A EP11719332A EP2556646B1 EP 2556646 B1 EP2556646 B1 EP 2556646B1 EP 11719332 A EP11719332 A EP 11719332A EP 2556646 B1 EP2556646 B1 EP 2556646B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- user
- access
- message
- request
- broadcast
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims description 31
- 230000011664 signaling Effects 0.000 claims description 48
- 238000004891 communication Methods 0.000 claims description 34
- 238000012545 processing Methods 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims description 2
- 230000004907 flux Effects 0.000 description 23
- 238000012546 transfer Methods 0.000 description 20
- 230000004044 response Effects 0.000 description 17
- 230000006870 function Effects 0.000 description 16
- 230000005540 biological transmission Effects 0.000 description 8
- 230000007246 mechanism Effects 0.000 description 7
- 230000000977 initiatory effect Effects 0.000 description 6
- 230000004048 modification Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 238000013475 authorization Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 4
- 239000000284 extract Substances 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000013519 translation Methods 0.000 description 3
- 238000012550 audit Methods 0.000 description 2
- 238000009792 diffusion process Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000010076 replication Effects 0.000 description 2
- 241001080024 Telles Species 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 210000004027 cell Anatomy 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/254—Management at additional data server, e.g. shopping server, rights management server
- H04N21/2541—Rights Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25808—Management of client data
- H04N21/2585—Generation of a revocation list, e.g. of client devices involved in piracy acts
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25866—Management of end-user data
- H04N21/25875—Management of end-user data involving end-user authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/65—Transmission of management data between client and server
- H04N21/658—Transmission by the client directed to the server
- H04N21/6582—Data stored in the client, e.g. viewing habits, hardware capabilities, credit card number
Definitions
- the invention lies in the field of telecommunications and more particularly in the field of television in an IP (Internet Protocol) type network.
- IP Internet Protocol
- the invention finds a particularly advantageous application in the field of IP networks for broadcasting audiovisual data, in particular when accessing a multicast content broadcasting service according to the mechanisms defined in the domain of the IMS (" IP Multimedia Subsystem ") by 3GPP (3rd Generation Partnership Project) and TISPAN (Telecommunications and Internet Converged Services and Protocols for Advanced Networking) standards organizations.
- IMS IP Multimedia Subsystem
- 3GPP 3rd Generation Partnership Project
- TISPAN Telecommunications and Internet Converged Services and Protocols for Advanced Networking
- the document US 2005/0220132 presents a system in a network of data packets controlling access to broadcast streams to process a request from a user requesting an unauthorized stream.
- the IMS is a network architecture that allows establishment and control of a multimedia session as well as resource reservation at the media stream transport network level. This network architecture also allows the implementation of an interaction between services.
- the technical specifications ETSI TS 182 027 and TS 183 063 defined by the TISPAN group describe the IPTV architectures on an IMS architecture and mechanisms enabling a user's terminal to access a content broadcast service in the mode.
- multicast for example "TV Broadcast”.
- For a data flow is defined a broadcast address or multicast address that allows a user to receive the broadcast stream.
- a service platform implementing this service checks whether the user has the right to access the service and then restricts this access to a service. list of data flows according to his subscription. The user's terminal then obtains from the service platform a list of broadcast addresses or multicast addresses respectively associated with the data streams of the list.
- a P-CSCF Proxy Call Session Control Function is responsible for sending a request for resources to destination of a resource control subsystem or RACS, for "Resource and Admission Control Subsystem", to implement an admission control and / or resource control function.
- RACS resource control subsystem
- Such a subsystem is specified by the TISPAN group in ETSI ES 282 003.
- This RACS resource control subsystem will evaluate the resource request transmitted by the P-CSCF and is able to configure a device in the plan. transfer.
- Such equipment is in charge of distributing the data flows to the users who requested it.
- the resource request between the P-CSCF session controller and the RACS subsystem may include a description of the list of allowed multicast addresses for the user.
- the command between the RACS subsystem and the transfer plan equipment may include the description of a filter to be installed on the equipment of the transfer plan.
- This filter composed of multicast filtering rules, defines multicast addresses to which the user's terminal is entitled to access.
- the filter includes multicast addresses to which the user's terminal is not allowed to access.
- the equipment of the transfer plan is then in charge of the processing of requests for access to multicast addresses issued by the user via the multicast signaling protocol, such as IGMP ("Internet Group Management Protocol"), and can accept or deny requests for access based on the rules of the installed filter.
- IGMP Internet Group Management Protocol
- the implementation of the RACS subsystem requires the setting up of a new function in the network but also the updating or the replacement of the equipment of the transfer plan so that they can be ordered and configured since the RACS subsystem.
- the impact of the implementation of such a "TV Broadcast" service on the network of an operator is therefore important.
- One of the aims of the invention is to remedy the shortcomings / disadvantages of the state of the art and / or to make improvements thereto.
- the network access device is itself in charge of implementing access control to broadcast data streams. It is easy to integrate such a function in the network access device and the upgrade can be performed by downloading a new software version.
- Such a network access device is for example a residential gateway. It allows access to a communication network to a set of user terminals located in a home network.
- the access control method takes advantage of the privileged location of the network access device and the functions it implements. Indeed, in a particular mode of realization, the network access device implements an agent function for the signaling relating to the session, for example according to the SIP protocol, for "Session Initiation Protocol", in charge of relaying the SIP signaling and the sessions established with network service platforms, and a proxy or "proxy" function for the Multicast, IGMP or MLD signaling protocol, for "Multicast Listener Discovery", in charge of relaying signaling according to the multicast signaling protocol from or to the user's terminal.
- the network access device can obtain session-related signaling of a set or list of allowed broadcast data streams for a user and then implement access control at the proxy function level for the user.
- the access control method according to the invention does not require control of the network access device by one of the network equipment. It is completely autonomous to obtain access control information, and then implement this access control. With the access control method described above, it is possible to deport the access control to the network access device and thus to avoid upgrades of the equipment in the transfer plan.
- the rejection of the access request can be explicit, that is to say with user notification, or implicit.
- the access request is rejected, it is blocked by the access control device and is not propagated to the communication network.
- the unauthorized data flow is not transmitted to the user's terminal, since the access request has been blocked.
- Requests for access to authorized flows for the user are in turn transmitted in the communication network and the transmission of the authorized data flow is carried out by the first equipment of the transfer plan, able to process the access request. .
- the access control method is compatible with mechanisms for scrambling the data streams.
- even unauthorized data flows are routed to the user's terminal. However, they can not be returned in clear by the terminal of the user in the absence of possession of a scrambling key. Their routing to the user's terminal then leads to an unnecessary network load.
- a malicious user may also record the unauthorized data stream in order to subsequently attempt to determine the scrambling key and thus return it unencrypted.
- the access control method as described above thus makes it possible to limit the load of the links to the access gateway to the network and to reinforce the protection of the broadcast data streams.
- the access control method is compatible with the existing mechanisms for the "TV Broadcast" service, both at the establishment and control of the sessions relating to the service, as well as that of the multicast signaling protocol. .
- the set of authorized data flows is for example obtained from an application session opening agreement message, a modification message of the application session.
- the set of authorized data streams is extracted from the message.
- the set of authorized data flows is derived from a set of forbidden data flows, extracted from the agreement message opening the application session.
- the access control method further comprises a step of recording in an array of said set obtained in association with the user.
- the set of authorized data flows is registered in association with a user's identifier to enable subsequent requests for access by that user to be processed.
- the identifier of the user may be composed of an IMS public identifier, IMPU for "IP Multimedia Public Identity", and / or the IP address of the user's terminal.
- the access control method further comprises, on receiving a release message from the application session, a step of deleting the table of the record associated with the user.
- the invention relates to a system for accessing a broadcast data stream, comprising a device for access by a user to a broadcast data stream as described above and at least one network device, arranged to broadcast said data stream.
- the invention also relates to a computer program comprising instructions for implementing the access control method as described above, implemented by an access device, when this program is executed. by a processor.
- a device for accessing a communication network 10 in its environment will be described in relation to the figure 1 according to a particular embodiment.
- the network access device 10 allows access to the communication network to user terminals 20, 22 of a local, home or private network. More precisely, it is placed later in the case where this access device to the communication network is a residential gateway.
- the user terminals 20, 22 are also known under the name "STB" for "Set Top Box”. They have functions for initializing and managing IPTV services on an IMS architecture. As such, these terminals are identified as the applicants or users when accessing a broadcast or multicast data stream. Such a stream of data broadcast is called thereafter "multicast stream”.
- IGMP multicast signaling protocol This protocol is more specifically described in the IETF documents (RFC 1112, RFC 2236 and RFC 3376), and no limitation is attached to the use of this protocol, for example the description is easily transferable to other Multicast protocols, such as MLD, for Multicast Listener Discovery, which is the equivalent of IGMP for an IPv6-based communication network
- MLD Multicast Listener Discovery
- MLDv1 equivalent to IGMPv2 in terms of functionality and described in IETF RFC 2710
- MLDv2 is equivalent to IGMPv3 in terms of functionality and described in IETF RFC 3810.
- the first entity 12 of the gateway 10 communicates with an IMS core network 30 and a service platform or application server 34 offering a "TV Broadcast" service.
- the core IMS network 30 includes a set of CSCF proxy servers in charge of routing SIP signaling messages between users or between a user and the service platforms.
- the IMS core network 30 is based on an IP transfer plan 36.
- a transfer plan 36 comprises transfer equipment 32, which has multicast routing functions, making it possible to implement the replication and broadcasting of data streams.
- broadcast data corresponding for example to television channels, following requests for user access.
- the packets of a multicast stream are broadcast using a particular destination IP address, called "multicast address".
- a multicast stream is characterized by a source address and a group address. Each multicast stream is thus represented by a single pair (S, G). Two separate multicast streams may have the same source address S or the same group address G.
- the multicast stream is transmitted to at least one user terminal following the reception from it of an "Membership report" message specifying the source address and the group address.
- the first device 32 of the transfer plan 36 capable of interpreting this message transmits the required multicast stream on the link from which the request originates.
- a multicast stream request can also refer to a set of sources for a given group. We then speak of flows (*, G) corresponding to a sum of the flows emitted by different sources on the same group G.
- the method of controlling access to a broadcast data stream will now be described in relation to the figure 2 , representing a phase of establishment of an application session for access to a "TV Broadcast” service, the figure 3 , representing a phase of TV channel change and the figure 4 , representing a release phase of the application session for access to the "TV Broadcast” service.
- the description is made using the IPTV IMS mechanisms as described by the specifications of ETSI TISPAN for illustrative purposes.
- the user terminal 20 transmits a message M1 requesting an opening of an application session relating to the service "TV Broadcast" to the gateway 10.
- This is a SIP INVITE login request including a first identifier of the user, called public identifier IMS, IMPU for "IP Multimedia Public Identity", and information on the bouquets of TV channels to which the user terminal 20 wishes to have access, in the form of an offer of description of the session or "SDP Offer", for "Session Description Protocol”.
- the message M1 is received by the first entity 12 of the gateway 10 and is relayed to the core IMS network 30, then the application server 34, the latter containing the logic of the service requested by the user terminal.
- an M2 response message for example a SIP 2000K message, including in particular the first identifier of the user IMPU and, in the form of a session description response or "SDP answer", a set or a list of authorized TV channel packages and for each authorized channel in the set or list, a channel identifier and the multicast IP address.
- This response message M2 to the IPTV terminal of the user is transmitted through the IMS core network 30, then the gateway 10. The response message M2 is thus received by the gateway 10.
- the SIP proxy entity 12 determines that the response message M2 corresponds to an agreement to open the session.
- the application server 34 confirms that the user can access the TV service package No. 1 and gives the list of multicast IP addresses, that is to say the addresses 224.0.70.101 and 224.0. 70.102 in the example above, and the corresponding string identifiers, ie ch1@orange.com and ch2@orange.com still in the example above.
- the SIP proxy entity 12 obtains from the response message M2 the first identifier of the user, the list of authorized TV channel packages as well as the string identifiers and their respective multicast IP addresses. More precisely, the SIP proxy entity 12 extracts them from the response message M2. The SIP proxy entity 12 also retransmits the response message M2 to the terminal of the user 20. The SIP proxy entity 12 also extracts from the response message M2, more specifically from the IP header of the packet carrying the message. M2 response, a second identifier of the user.
- the elements obtained from the packet carrying the response message M2 thus consist of user identifiers and the list of allowed multicast IP addresses. These extracted elements are transmitted to the proxy entity for the multicast signaling protocol 14, "IGMP snooping / proxy", of the gateway 10 for example in the form of an M3 message using an API programming interface. , for "Application Programming Interface”.
- Such an M3 message includes the user's identifiers and the list of allowed multicast IP addresses in the form of filters.
- the second identifier of the user is for example the IP address of the user's terminal. It is emphasized here that when the gateway 10 implements an address translation function or NAT, that is to say an association between a private IP address used in the private network and a public IP address stored in a table translation, the second identifier does not correspond directly to the IP address extracted from the packet carrying the response message but to the private address read in the translation table.
- an address translation function or NAT that is to say an association between a private IP address used in the private network and a public IP address stored in a table translation
- the proxy entity for the multicast signaling protocol 14 receives this message M3 and then stores in a table the list of authorized multicast IP addresses, to which the terminal 20 is able to request access by means of multicast protocol messages, in association with the user's credentials.
- the SIP proxy entity 12 is able to perform an access control by the terminal 20 to the TV channels.
- the access control is thus remote from the transfer equipment 32 to the gateway 10, and more precisely its proxy entity for the multicast signaling protocol 14. This avoids significant updates of the transfer equipment.
- the access authorization information is extracted from messages transmitted by the communication network during the application session negotiation and are therefore reliable.
- the gateway 10 performs this access control on a limited number of users, which does not complicate the software of the gateway.
- the proxy entity for the multicast signaling protocol 14 acknowledges by an acknowledgment message M4 the receipt of the message M3.
- the user terminal 20 Upon receipt of the message M2 response, the user terminal 20 transmits to the gateway 10, more specifically to the SIP 12 proxy entity, an M5 SIP acknowledgment message or "SIP ack". This message M5 is then relayed to the core network IMS 30 and then to the application server 34.
- the user terminal 20 transmits to the gateway 10, more precisely to the proxy entity for the multicast signaling protocol 14, a message M6 conforming to the multicast signaling protocol, for example an "IGMP Report (S, G1) message.
- IGMP Report S, G1
- the terminal of the user 20 requests access to the chain ch1@orange.com, identified by the multicast IP address 224.0.70.101.
- This M6 access request message is received by the proxy entity for the multicast signaling protocol 14 in a step F3. Still in this step F3, the proxy entity for the multicast signaling protocol 14 checks whether the terminal of the user 20 has the right to access the requested channel. The control is based firstly on the identifier of the requesting terminal included in the M6 access request message to obtain the list of allowed multicast IP addresses and secondly on the multicast IP address contained in the same message. to perform access control.
- the access request message M6 comprises the second identifier of the user, that is to say the IP address of the terminal.
- the message M6 comprises a third identifier of the user, for example a MAC address, for "Media Access Control".
- the gateway 10 determines which second identifier is associated with this third identifier before obtaining the list of allowed multicast IP addresses. It is thus understood that the method as described is easily adaptable to other types of user identifiers.
- the access request message M6 is transmitted to the communication network, more specifically to the transfer equipment 32.
- the data flow associated with the TV channel is then transmitted to the terminal of the user 20.
- the M6 access request message is blocked by the proxy entity for the multicast signaling protocol 14. No message from access request is transmitted to the communication network. The data stream associated with the TV channel is therefore not transmitted to the user's terminal. In an alternative embodiment, the user's terminal 20 is notified of the rejection.
- the gateway 10 sets up an access control for TV channels for a user terminal 20 having established an application session with the application server 34.
- the user terminal 20 transmits an M20 message corresponding to a request to stop the first TV channel, for example an "IGMP Leave (S, G1)" message.
- the message M20 is relayed by the proxy entity for the multicast signaling protocol 14 to the equipment of the transfer plan 32.
- the transmission of the data stream associated with the first TV channel to the user's terminal is then stopped.
- the proxy entity for the multicast signaling protocol 14 obtains from the message M20 the second identifier of the user and verifies that the TV channel for which a stop is requested corresponds to a channel authorized for this purpose. user. If this is not the case, the stop request is not relayed. This avoids sending an unjustified stop request to the transfer equipment 32.
- the user terminal 20 transmits to the gateway 10, more precisely to the proxy entity for the multicast signaling protocol 14, a message M21, corresponding to a request for access to a second channel, for example by a "IGMP Report (S, G2)" message.
- the proxy entity for the multicast signaling protocol 14 again implements the step F2 described above.
- the access request message M21 is transmitted to the communication network and the data flow associated with the second TV channel is transmitted to the user's terminal 20.
- the access request message M21 is blocked and the data stream associated with the second TV channel is not transmitted.
- the user's terminal 20 is notified of the rejection.
- the user's terminal 20 transmits an M30 message corresponding to a request to stop broadcasting the first TV channel, for example an "IGMP Leave (S, G1) ".
- the message M30 is relayed by the proxy entity for the multicast signaling protocol 14 to the transfer equipment 32.
- the transmission of the data stream associated with the first TV channel to the user's terminal 20 is then stopped.
- the proxy entity for the multicast signaling protocol 14 can implement access control on this stop request.
- the user terminal 20 transmits to the gateway 10, more specifically to the SIP proxy entity 12, a message M31 release session, for example "SIP Bye".
- the SIP proxy entity 12 determines that it is a session release message and extracts from the session release message M31 the first identifier of the user.
- the SIP 12 proxy entity also extracts the second identifier of the user of the IP header of the packet carrying the message M31. It then transmits the user's identifiers to the proxy entity for the multicast signaling protocol 14, "IGMP snooping / proxy", of the gateway 10, for example in the form of an M32 message using the interface PLC programming, this M32 message requesting the uninstallation of the multicast filters for this user.
- the proxy entity for the multicast signaling protocol 14 receives this message M32 and then deletes from the table the list of multicast IP addresses associated with the user of the terminal 20.
- the proxy entity for the multicast signaling protocol 14 acknowledges by an acknowledgment message M33 the receipt of the message M32.
- the SIP proxy entity 12 relays the message M31 to the core IMS network 30, which forwards it to the application server 34.
- the application server 34 responds to the terminal of the user 20 by an acknowledgment message M34, for example a "SIP 2000K” message, via the IMS core network 30, and then from the gateway 10, more specifically the SIP proxy 12.
- an acknowledgment message M34 for example a "SIP 2000K” message
- a device 100 for access by a user to a data stream broadcast in a communication network will now be described in relation to the figure 5 .
- Such a device is especially designed to allow access of the user to the communication network.
- the obtaining module 108 is further arranged to record in the table the set of authorized data flows obtained in association with one or more user identifiers.
- the relay module 104 of the multicast signaling is furthermore arranged to receive a request for access to a multicast data stream, to command the processing module 106 to receive in return an authorization for transmission or not of the access request and for relay the access request in case of authorization.
- the access device comprises the two entities as described above.
- the first entity 12 is arranged to relay messages relating to the application session and the second entity 14 is arranged to relay messages relating to a multicast signaling protocol.
- the first entity 12 then comprises the modules 102 signaling relays for the session and 108 for obtaining.
- the second entity 14 then comprises the modules 104 relay multicast signaling, 106 processing an access request and table 110.
- the access control device may be integrated into a communication network access gateway.
- the software modules can be stored in or transmitted by a data carrier.
- a data carrier This may be a hardware storage medium, for example a CD-ROM, a magnetic diskette or a hard disk, or a transmission medium such as an electrical signal, optical or radio, or a telecommunications network.
- the invention also relates to a system for accessing a broadcast data stream, comprising a device for access by a user to a broadcast data stream as described above and at least one device 32 of the network, arranged to broadcast said stream. of data.
- the method can easily be transposed to one embodiment, in which the application session is opened using the "http" protocol, for "HyperText Transfer Protocol".
- a proxy entity for this "http" protocol relating to the application session then obtains from the response message the set of authorized channels for the user, as has been previously described for the SIP protocol.
- the SIP proxy entity 12 transmits two identifiers of the user to the proxy entity for the multicast signaling protocol 14.
- Other embodiments are also conceivable, in which only the first identifier of the user, IMPU, is transmitted and stored in table 110 in association with the list of authorized channels.
- the proxy entity for the multicast signaling protocol 14 receives an access request message M6, M21, it first verifies that the IP address provided in the message corresponds to that of a message. registered terminal and gets in return the first identifier of the user IMPU.
- the proxy entity for the multicast signaling protocol 14 uses the first identifier obtained to obtain the list of authorized TV channels.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Computer Graphics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Claims (8)
- Verfahren zur Kontrolle des Zugriffs durch einen Benutzer (20, 22) · auf einen in einem Kommunikationsnetz verbreiteten Datenstrom, wobei das Verfahren die folgenden Schritte enthält, die von einer Zugriffsvorrichtung (10, 100) durchgeführt werden, mittels der der Benutzer auf das Netz zugreift:- Erhalt (F1) einer Einheit von genehmigten Datenströmen ausgehend von einer von der Zugriffsvorrichtung empfangenen und für den Benutzer bestimmten Mitteilung, wobei die Mitteilung sich auf eine Anwendungssitzung zwischen dem Benutzer und einer Dienstplattform (34) bezieht;- Empfang (F3) einer Zugriffsanforderung des Benutzers auf den Datenstrom;- Überprüfung (F3), dass der Strom nicht zu der Einheit von genehmigten Datenströmen gehört, die für den Benutzer erhalten wurde;- Zurückweisung der Zugriffsanforderung.
- Zugriffskontrollverfahren nach Anspruch 1, das außerdem einen Schritt (F2) der Registrierung in einer Tabelle der Einheit enthält, die in Verbindung mit dem Benutzer erhalten wurde.
- Zugriffskontrollverfahren nach Anspruch 2, das außerdem bei Empfang einer Mitteilung der Unterbrechung der Anwendungssitzung einen Schritt (F5) des Löschens der dem Benutzer zugeordneten Registrierung aus der Tabelle enthält.
- Zugriffskontrollverfahren nach Anspruch 1, das außerdem die folgenden Schritte enthält:- Empfang einer Anforderung des Anhaltens der Verbreitung eines Datenstroms;- Überprüfung, dass der Datenstrom nicht zu der Einheit von genehmigten Datenströmen gehört, die für den Benutzer erhalten wurde;- Zurückweisung der Anhalteanforderung.
- Vorrichtung (10, 100) für den Zugriff durch einen Benutzer auf einen in einem Kommunikationsnetz verbreiteten Datenstrom, die eingerichtet ist, um einen Zugriff des Benutzers auf das Netz zu erlauben:- Einrichtungen (108) zum Erhalt einer Einheit von genehmigten Datenströmen ausgehend von einer von der Zugriffsvorrichtung empfangenen und für den Benutzer bestimmten Mitteilung, wobei die Mitteilung sich auf eine Anwendungssitzung zwischen dem Benutzer und einer Dienstplattform bezieht;- Einrichtungen (104) zum Empfang einer Zugriffsanforderung des Benutzers auf den Datenstrom;- Einrichtungen (106) zur Verarbeitung der Zugriffsanforderung, die eingerichtet sind, um die Zugriffsanforderung zurückzuweisen, wenn der Strom nicht zu der Einheit von für den Benutzer genehmigten Datenströmen gehört.
- Zugriffs-Gateway auf ein Kommunikationsnetz für mindestens einen Benutzer, das ein erstes Modul (12), das eingerichtet ist, um Mitteilungen bezüglich der Anwendungssitzung weiterzuleiten, und ein zweites Modul (14) enthält, das eingerichtet ist, um Mitteilungen bezüglich eines Multicast-Signalisierungsprotokolls weiterzuleiten, wobei:- das erste Modul außerdem eingerichtet ist, um eine Einheit von genehmigten Datenströmen ausgehend von einer von der Zugriffsvorrichtung empfangenen und für den Benutzer bestimmten Mitteilung zu erhalten, wobei die Mitteilung sich auf eine Anwendungssitzung zwischen dem Benutzer und einer Dienstplattform bezieht;- das zweite Modul außerdem eingerichtet ist, um eine Zugriffsanforderung des Benutzers auf einen im Netz verbreiteten Datenstrom zu empfangen, um zu überprüfen, dass der Strom nicht zu der Einheit von für den Benutzer genehmigten Datenströmen gehört, und um die Zugriffsanforderung zurückzuweisen.
- Zugriffssystem auf einen verbreiteten Datenstrom, das eine Zugriffsvorrichtung durch einen Benutzer auf einen verbreiteten Datenstrom nach Anspruch 5 und mindestens eine Ausrüstung des Netzes enthält, eingerichtet, um den Datenstrom zu verbreiten.
- Computerprogramm, das Anweisungen zur Durchführung des Zugriffskontrollverfahrens nach Anspruch 1 aufweist, die von einer Zugriffsvorrichtung durchgeführt werden, wenn dieses Programm von einem Prozessor ausgeführt wird.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1052704 | 2010-04-09 | ||
PCT/FR2011/050755 WO2011124834A1 (fr) | 2010-04-09 | 2011-04-05 | Technique de controle d'acces a un flux de donnees diffuse |
Publications (2)
Publication Number | Publication Date |
---|---|
EP2556646A1 EP2556646A1 (de) | 2013-02-13 |
EP2556646B1 true EP2556646B1 (de) | 2016-12-21 |
Family
ID=43466908
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP11719332.6A Active EP2556646B1 (de) | 2010-04-09 | 2011-04-05 | Verfahren zum zugriff auf einem ausgestrahlten datenflusses |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP2556646B1 (de) |
WO (1) | WO2011124834A1 (de) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020258753A1 (zh) * | 2019-06-28 | 2020-12-30 | 烽火通信科技股份有限公司 | 一种基于融合终端的智能插件运行方法及系统 |
US20220272102A1 (en) * | 2021-02-24 | 2022-08-25 | Cisco Technology, Inc. | Creating Network-Based Consent Contracts |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9027088B2 (en) | 2012-06-14 | 2015-05-05 | Ericsson Modems Sa | Systems and methods for protection of a SIP back-to-back user agent on modems |
US12021754B2 (en) | 2021-02-24 | 2024-06-25 | Cisco Technology, Inc. | Enforcing consent contracts to manage network traffic |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040240466A1 (en) | 2000-11-29 | 2004-12-02 | Brian Unitt | Access control enhancements for delivery of video and other services |
US20050220132A1 (en) | 2004-03-30 | 2005-10-06 | Packetfront Sweden Ab | Multicast |
US20090089843A1 (en) | 2007-09-27 | 2009-04-02 | Kahn Raynold M | Method and system for providing content to a content distribution system suitable for a multiple dwelling unit using an authorization list |
US20090235347A1 (en) | 2008-03-12 | 2009-09-17 | Yahoo! Inc. | Method and system for securely streaming content |
EP2124385A1 (de) | 2007-06-04 | 2009-11-25 | Huawei Technologies Co., Ltd. | Verfahren, vorrichtung und system zur steuerung der authorisierung für einen multicast-dienst |
US7644429B2 (en) | 1997-03-21 | 2010-01-05 | Nagra Thomson Licensing | Broadcast and reception, and conditional access system therefor |
US20100046528A1 (en) | 2008-08-21 | 2010-02-25 | Telefonaktiebolaget Lm Ericsson (Publ) | Intelligent IMS Gateway for Legacy DSLAMs |
-
2011
- 2011-04-05 EP EP11719332.6A patent/EP2556646B1/de active Active
- 2011-04-05 WO PCT/FR2011/050755 patent/WO2011124834A1/fr active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7644429B2 (en) | 1997-03-21 | 2010-01-05 | Nagra Thomson Licensing | Broadcast and reception, and conditional access system therefor |
US20040240466A1 (en) | 2000-11-29 | 2004-12-02 | Brian Unitt | Access control enhancements for delivery of video and other services |
US20050220132A1 (en) | 2004-03-30 | 2005-10-06 | Packetfront Sweden Ab | Multicast |
EP2124385A1 (de) | 2007-06-04 | 2009-11-25 | Huawei Technologies Co., Ltd. | Verfahren, vorrichtung und system zur steuerung der authorisierung für einen multicast-dienst |
US20090089843A1 (en) | 2007-09-27 | 2009-04-02 | Kahn Raynold M | Method and system for providing content to a content distribution system suitable for a multiple dwelling unit using an authorization list |
US20090235347A1 (en) | 2008-03-12 | 2009-09-17 | Yahoo! Inc. | Method and system for securely streaming content |
US20100046528A1 (en) | 2008-08-21 | 2010-02-25 | Telefonaktiebolaget Lm Ericsson (Publ) | Intelligent IMS Gateway for Legacy DSLAMs |
Non-Patent Citations (1)
Title |
---|
BITAR ET AL.: "Applicability of Access Node Control Mechanism to PON based Broadband Networks", DRAFT-BITAR-WADHWA-ANCP-PON-03.TXT, 7 March 2010 (2010-03-07), pages 1 - 64, XP055421860 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020258753A1 (zh) * | 2019-06-28 | 2020-12-30 | 烽火通信科技股份有限公司 | 一种基于融合终端的智能插件运行方法及系统 |
US20220272102A1 (en) * | 2021-02-24 | 2022-08-25 | Cisco Technology, Inc. | Creating Network-Based Consent Contracts |
Also Published As
Publication number | Publication date |
---|---|
WO2011124834A1 (fr) | 2011-10-13 |
EP2556646A1 (de) | 2013-02-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2025181B1 (de) | System zum zugriff auf ein ip-fernsehdienst in einem ims-architektur-netzwerk | |
EP2556646B1 (de) | Verfahren zum zugriff auf einem ausgestrahlten datenflusses | |
Ludwig et al. | Xep-0166: Jingle | |
WO2016156694A1 (fr) | Procédé de priorisation de flux médias dans un réseau de communications | |
EP3476108B1 (de) | Verfahren, computer programm und vorrichtung zum bereitstellen einer adresse durch eine zu verwaltende vorrichtung eines netzwerks | |
US8356325B2 (en) | System and method for transferring a session across domains and subscriptions | |
EP2332332A1 (de) | Verfahren und einrichtung zum umlenken einer datenflussüberwachungsanfrage | |
US8542603B2 (en) | Distributed resource management in networks | |
EP2266279B1 (de) | Gemeinsame nutzung von multimedia-inhalten über eine audio-video-kommunikation | |
KR20110000593A (ko) | 멀티캐스트 스트림을 이용하여 주문형 스트리밍 콘텐츠의 제공을 촉진하기 위한 방법 및 장치 | |
WO2011144846A1 (fr) | Technique d'acces a un service par un utilisateur | |
EP3808060A1 (de) | Verfahren zur nachrichtenverarbeitung durch eine vorrichtung eines voice-over-ip-netzes | |
EP2504957B1 (de) | Zugriff auf referenzierungsinhalten mit einem inhaltsserver | |
EP2614630B1 (de) | Verarbeitung von daten zur benachrichtung einer vorrichtung | |
EP3050275B1 (de) | Verbesserte protokollumwandlung in einem telekommunikationsnetz zur bereitstellung von diensten mit verbesserter dienstgüte | |
US8285866B2 (en) | System and method for streaming content | |
EP2365686B9 (de) | Verfahren und Vorrichtung zur Telefonanrufverarbeitung in einem Kommunikationsnetz welches nomadische Endgeräte wie Softphone Endgeräte umfasst | |
Mikoczy et al. | Combinational services of NGN based IPTV | |
Abd-Elrahman et al. | Open-IPTV Services and Architectures | |
WO2014114871A1 (fr) | Enregistrement d'un equipement client par l'intermediaire d'un serveur mandataire dans un reseau de communication | |
FR2988885A1 (fr) | Base de donnees, serveur hss, et serveurs de controle d'un reseau ims | |
FR2916552A1 (fr) | Procede de transcodage de sessions de type sip. | |
Meyer | Extended Personal Media Networks (XPMN) | |
FR2968874A1 (fr) | Gestion de service dans un reseau |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20121018 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAX | Request for extension of the european patent (deleted) | ||
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: ORANGE |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
INTG | Intention to grant announced |
Effective date: 20160307 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: FRENCH |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 856341 Country of ref document: AT Kind code of ref document: T Effective date: 20170115 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602011033599 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 7 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20161221 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170321 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170322 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 856341 Country of ref document: AT Kind code of ref document: T Effective date: 20161221 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170421 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170421 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170321 Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R026 Ref document number: 602011033599 Country of ref document: DE |
|
PLBI | Opposition filed |
Free format text: ORIGINAL CODE: 0009260 |
|
26 | Opposition filed |
Opponent name: FREEBOX Effective date: 20170921 |
|
PLAX | Notice of opposition and request to file observation + time limit sent |
Free format text: ORIGINAL CODE: EPIDOSNOBS2 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
PLAU | Termination of opposition procedure: information related to despatch of decision deleted |
Free format text: ORIGINAL CODE: EPIDOSDOPC1 |
|
PLBD | Termination of opposition procedure: decision despatched |
Free format text: ORIGINAL CODE: EPIDOSNOPC1 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 |
|
PLBP | Opposition withdrawn |
Free format text: ORIGINAL CODE: 0009264 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170430 Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170430 Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170405 |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20170430 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 8 |
|
PLAN | Information deleted related to communication of a notice of opposition and request to file observations + time limit |
Free format text: ORIGINAL CODE: EPIDOSDOBS2 |
|
PLAX | Notice of opposition and request to file observation + time limit sent |
Free format text: ORIGINAL CODE: EPIDOSNOBS2 |
|
PLBB | Reply of patent proprietor to notice(s) of opposition received |
Free format text: ORIGINAL CODE: EPIDOSNOBS3 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170405 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170430 |
|
PLCK | Communication despatched that opposition was rejected |
Free format text: ORIGINAL CODE: EPIDOSNREJ1 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R100 Ref document number: 602011033599 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 |
|
PLBN | Opposition rejected |
Free format text: ORIGINAL CODE: 0009273 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: OPPOSITION REJECTED |
|
27O | Opposition rejected |
Effective date: 20180927 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20110405 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20161221 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161221 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R079 Ref document number: 602011033599 Country of ref document: DE Free format text: PREVIOUS MAIN CLASS: H04L0029060000 Ipc: H04L0065000000 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20240320 Year of fee payment: 14 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20240320 Year of fee payment: 14 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20240320 Year of fee payment: 14 |